SSL certificates secure ecommerce, communications and private information passed from browser to Web server and between servers. Join us for a complimentary webinar that covers key best practices for securely deploying SSL certificates for your specific environment. We will discuss:
•Private Keys for Quality Protection: Learn how to use private keys, a key factor in determining the quality of protection provided by SSL.
•Cater SSL For Your Environment: Discuss importance of selecting the appropriate Certification Authority (CA) and certificate type.
•Troubleshoot Your SSL Problems: Explore how advanced certificates can be used to help solve problems in your SSL applications.
The best way to mitigate security vulnerabilities on your web server is to configure that server in the most reliable way. Join us for our SSL Best Practices webinar and learn to stop threats from the start. This complimentary webinar will explore server configuration and server enhancement. We will discuss how secure server configuration for SSL protects your sites from online threats and:
•Implement the Proper Configuration: Learn which SSL server configuration options mitigate against known problems
•Enhanced Security Features: Discuss enhanced security features and the benefits they provide
•Tools For Configuration: Get a demonstration of available services that will help administrators assess the security configuration of their SSL web server
Phishing attacks are dangerous to your customers and could be detrimental to your brand. Securing your website and protecting your business are the cornerstone of Entrust SSL Best Practices. Join us for a complimentary webinar that covers key best practices for protecting your domain phishing attacks against the customer’s clientele and unsuspecting internet users. We will discuss:
•The Definition of a Trusted CA: Learn what controls a trusted Certificate Authority (CA) has in place to ensure that unauthorized administrator cannot acquire a certificate for your organization’s brand name.
•Domain Protection: Discuss how you can prevent another CA from issuing certificates for your domain and detect previously issued certificates.
•Domain and Brand Reputation: Explore subjects such as certificate transparency, Microsoft’s certificate reputation, HTTP public key pinning and certification authority authorization.
Always-On SSL is an approach to securing your website to mitigate attacks against your users. The goal is to extend SSL hardening beyond your own server and to your user’s browser so that you can both be assured of the security that SSL/TLS is supposed to provide.
* Learn how you can provide visitors with a positive user experience while providing better security.
* Discuss the vulnerabilities that can be exploited if you do not implement Always-On SSL including session hijacking, side-jacking, and similarly, man-in-the-middle attacks.
* Learn how good server configuration, HSTS and EV SSL Certificates are key to the successful deployment of Always-On SSL.
In this webinar, you'll learn more about how to get a dot bank domain name, and how to secure it with the best SSL certificates.Read more >
With numerous certificates sited across multiple locations and geographies, ensuring continuity and compliance has become a time-consuming, costly, and risky business for enterprises. In this 30-45 minute webinar you'll learn how Symantec Discovery can help to ensure continuity and compliance, and deliver peace of mind when it comes to your SSL/TLS certificate real estate.
- Discover your entire certificate infrastructure
- Instantly assess every certificate for security risks
- Reduce your risk of being non-compliant
- Learn about our free trial
There have been recent changes to the guidelines for the use of SSL Encryption by the Certification Authority/Browser (CAB) Forum, and these changes likely affect the types of certificates used and the security of your network. During this webinar you'll learn how the CAB Forum issued guidelines affect your business and the issuance of SSL certificates, changes associated with the issuance of certificates and risks and vulnerabilities from failure to comply with the guideline changes.
Please join Brian Trzupek, Vice President of SSL Managed Identity at Trustwave, as he discusses these changes and their potential long-term implications.
ECC ist der modernste Verschlüsselungsalgorithmus, der beim Schlüsselaustausch und der Authentifizierung mit den Protokollen SSL und TLS zum Einsatz kommt.
ECC wird RSA voraussichtlich ablösen, da der explosionsartige Anstieg der Mobilgerätenutzung und der Kommunikation zwischen Maschinen (M2M) sowie die Entwicklung des Internet der Dinge die Grenzen der Skalierbarkeit des derzeitigen Standardalgorithmus RSA übersteigen.
Die Zuverlässigkeit und Leistung von ECC sind inzwischen klar erwiesen. Die größte Hürde für den Einsatz des Algorithmus ist mangelnde Kompatibilität mit vorhandener Technik. Deshalb hat Symantec Hybrid-SSL-Zertifikate mit ECC und RSA entwickelt. Mit diesen Zertifikaten können Sie Ihre bisherigen Infrastrukturinvestitionen weiterhin nutzen und gleichzeitig Kompatibilitätsprobleme vermeiden.
In diesem Webcast erfahren Sie,
welche Vorteile ECC in puncto Sicherheit, Zuverlässigkeit und Kapazität bietet,
wie die Zertifikatskette eines Hybrid-SSL-Zertifikats mit ECC und RSA aussieht und
wie Sie ein solches Zertifikat beantragen.
ECC is the latest encryption algorithm used for key exchange and authentication purposes in the SSL/TLS protocols.
ECC is expected to replace RSA (current standard) as the scalability of RSA has become too limited to deal with the explosion of the number of mobile devices, machine-to-machine (M2M) communications and the development of the IoT (internet of the things).
The reliability and performance of ECC no longer needs to be demonstrated. However, a significant obstacle to the adoption of ECC lies on the lack of compatibility for such algorithm. This is why we have created ECC/RSA hybrid SSL certificates, allowing you to protect your current infrastructure investment while mitigating potential compatibility issues at the same time.
Join us in this webcast and find out:
-what are the main benefits of ECC in terms of strength, reliability and capacity
-how ECC/RSA hybrid certificate chains work
-what is the enrolment process
Encrypted communication using SSL/TLS is becoming ubiquitous. But many organizations are still experiencing security breaches from a lack of visibility. This webinar covers SSL/TLS information on performance, criteria for evaluating and a methodology on validation.Read more >
Managing a secure SSL environment is getting complex. Recent industry standards and security vulnerabilities required IT to migrate from SHA-1 to SHA-2 hash algorithm, find alternatives for certificates with non-fully-qualified domain (FQDN) names and replace certificates impacted by the Heartbleed vulnerability. In addition, initiatives like Google’s “HTTPS everywhere” or always-on SSL on Google search may increase the deployment of SSL certificates in an organization. All these changes add to the challenges of managing SSL certificates.
In the meantime, IT managers have to continue to provide optimal system performance to meet their users’ needs while staying within their budget.
Attend this exclusive webinar to:
- Discover recent changes and challenges with SSL certificate management
- Learn how you can minimize time and resources in monitoring and managing SSL certificates with Symantec Certificate Intelligence Center (CIC)
- Find out how you can optimize the performance of SSL encryption and decryption with the A10 Thunder Application Delivery Controller (ADC) from A10 Networks
Craig Spiezle will talk about the foundation of online trust and the benefits of having the entire online user experience protected with a best practice security measure for websites, called Always on SSL. We will also touch on other best practices.Read more >
Starting in earnest after the "Snowden Revelations" 2013, more and more service providers such as Google, Yahoo and Amazon have been embracing SSL by default. Whether in search, cloud services or webmail access, these providers have been instrumental in their support of a more secure and obfuscated web. But what does that mean for the enterprise information security professional? While the providers have "seen the light", have we become blinded by it? To ensure the inspection and subsequent protection of data streams in and out of our organizations, we need the ability to inspect encrypted traffic for policy violations or other malicious activity while still ensuring multi- jurisdictional rights to privacy. Join Blue Coat and (ISC)2 on May 26, 2016 for a roundtable discussion exploring methods and mechanisms for addressing SSL inspections and the search for malicious activity.Read more >
Combating Advanced Cyber-threats grows more challenging every day. Cyber criminals are cloaking their attacks within Secure Sockets Layer (SSL) traffic, knowing very well that perimeter security devices are blind to their exploits.
Despite solving the dilemma that all of your network security devices can have the ability to scrutinize SSL traffic with the right tools in place, the issue of maintaining user privacy is the next concern. How can you inspect SSL traffic for threats while maintaining the privacy of employee online banking, healthcare, and shopping transactions?
Increased SSL usage causes new headaches for IT security. Monitoring and enforcing compliance with internal and external standards for acceptable use of SSL encryption is difficult at best and needs to be able to look at ALL SSL traffic, not just port 443. Implementation of weak encryption keys and sub-par cipher suites often give organizations a false sense of security.
This workshop will provid Decision Makers and Security Practitioners with the knowledge to equip existing security devices to inspect SSL traffic and maintain high performance capabilities, while maintaining user privacy and enforcing SSL-usage standards, with a common criteria certified device.
Don’t miss this opportunity to learn more.
Last year brought a lot of news about government snooping and public attacks against certain encryption and hash algorithms. These developments should concern anyone that values data privacy.
View this recorded session with the Online Trust Alliance and Akamai Technologies to discover the current best practices in securing your website and internal infrastructure. Learn how to implement Always on SSL (AOSSL) and Perfect Forward Secrecy (PFS) to better secure your data.
Join us to learn:
· How to implement AOSSL and PFS in your environment
· What precautions you need to take to protect your website and intranet infrastructure
Learn how to reduce the cost of managing your SSL certificates.Read more >
Australia June 25th 1.30 pm
New Zealand June 25th 3.30 pm
Singapore June 25th 11.30 am
Shanghai June 25th 11.30 am
Taiwan June 25th 11.30 am
Hong Kong June 25th 11.30 am
To protect yourself, your network and your business, you must understand the big picture. Please join us for this webinar in which we’ll prepare you for the upcoming changes in SSL certificate security.
Most importantly, learn how you can minimize the negative impact of Google's SHA-1 deprecation plan on your business, in addition to other important security news.
What we’ll cover:
1) Google's SHA-1 deprecation plan for December 2015
2) CA/B Forum Baseline Requirements, Non-FQDN & gTLD changes
3) Security threats that you should be on the lookout for
Als Sicherheitsspezialist sind Sie ständig auf der Hut vor externen Bedrohungen. Die heutige dynamische, komplexe Infrastruktur führt aber auch zu vielen internen Sicherheitsverletzungen aufgrund falscher Konfiguration von IT-Ressourcen, wie etwa SSL. Um zu einem sichereren Umgang mit diesem Verschlüsselungsprotokoll beizutragen, hat Qualys das Forschungsprojekt SSL Labs ins Leben gerufen, das zwei Hauptprobleme im Sicherheits-Ökosystem angehen will: fehlende Tools und fehlende Dokumentation. Besuchen Sie einen neuen Webcast von Qualys, um sich über den aktuellen Stand der SSL-Verschlüsselung zu informieren und zu erfahren, was gegen die gravierenden Probleme getan werden kann. Verpassen Sie nicht diese wichtigen aktuellen Informationen zu SSL, die Ihnen Ressourcen und entscheidende Schritte zur Erhöhung Ihrer Sicherheit aufzeigen.Read more >
As a security professional, you are on constant alert for external threats. But many breaches are caused internally by incorrect configuration of IT resources, including SSL. To help improve how encryption is used, Qualys created a research project called SSL Labs to address two major problems of the ecosystem: lack of tools and documentation.Read more >
Join us on Jan 29, 2015 to learn how SafeNet Luna HSMs integrate with Palo Alto Networks Firewall Platforms to protect the integrity of the SSL communications.Read more >